The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle authentication authority. Successful exploitation could allow attackers to bypass the password requirement.